Articles about Security

Wiper makes conversations more secure, offers on-demand chat deletion

Wiper

Today, there is a messaging service for just about anything and anyone. The core features are pretty much the same across the board, however. Where they differ is mostly in the way those features are implemented. For instance, you can chat with others using any messaging app, but not all offer encrypted conversations or delete your messages after they're received. The devil is in the details, as always.

Despite all the different options available today, there is still room for new messaging services to make their mark. Wiper is among the new up and coming players, with its main highlights being the option to delete conversations everywhere, on-demand, and provide secure HD video chats.

Continue reading

Brace yourself for a bumper Patch Tuesday say experts

Patch download

Next week's round of Patch Tuesday updates from Microsoft is set to be the biggest so far this year with 16 bulletins in total, five of which are rated Critical and nine as Important.

Most of the Critical bulletins are for Windows components and affect a range of supported systems. Karl Sigler, Threat Intelligence Manager at Trustwave says, "If you are currently running a supported version of Windows, you will want to update as soon as these updates become available. These are some of the nastier vulnerabilities we've seen in Windows in a while".

Continue reading

Want to stay safe from WireLurker malware on iOS, OS X? Don't use shady app stores!

Warning Sign Sky Cloud Cloudy

In spite of some incidents here and there, both iOS and OS X are mostly safe from malware. Obviously, that assumption only holds true assuming that users do not go out of their way to get into trouble by jailbreaking their devices and messing with cracked apps or software grabbed from shady places. It is common sense, really -- the security measures that Apple enforces can only go so far to protect users in uncontrolled environments. (The same thing can also be said in regards to Android and Windows, but that is a different story.) And if you need any more proof of just how important it is to stick to trusted sources, this is it.

In the past six months, hundreds of thousands of iOS and OS X users have been affected by the WireLurker malware family, according to security research firm Palo Alto Networks, after using Chinese third-party app store Maiyadi App Store to download OS X software. Go figure!

Continue reading

Backupify adds HIPAA compliance to enterprise security features

Cloud Security Lock

Cloud backups are all the rage at the moment, but they do raise security concerns, particularly for businesses that deal with sensitive information.

Cloud to cloud backup specialist Backupify has added some new features to its service to make it more secure. These include HIPAA (Health Insurance Portability and Accountability Act) compliance as well as new features for admins.

Continue reading

5 things your CIO needs to know about identity

truths

When CIOs talk security they often use words like "firewall" and "antivirus." Here's why today's technology landscape needs a different vocabulary.

Modern businesses are more open than ever before, but that doesn't mean they are more secure. On the business side, companies are taking advantage of cloud computing by focusing on their internal competencies and outsourcing what they can to third-party vendors. On the consumer side, employees armed with devices are increasingly demanding flexible and frictionless access to data from anywhere.

Continue reading

Badly secured routers leave 79 percent of US home networks at risk of attack

Wi-Fi router

As many as four out of five internet-connected households in the US could be at risk of attack through their wireless router.

This is among the findings of a study by security specialist Avast which found that more than half of all home routers are poorly protected using default or easily hacked password combinations such as admin/admin or admin/password.

Continue reading

Electronic Frontier Foundation finds Skype, WhatsApp and more are disappointingly insecure

Electronic Frontier Foundation finds Skype, Whatsapp and more are disappointingly insecure

Secure communication is something we all crave online, particularly after Edward Snowden's NSA revelations increased public interest in privacy and security. With dozens of messaging tools to choose from, many claiming to be ultra-secure, it can be difficult to know which one to choose and which one to trust. Electronic Frontier Foundation (EFF) has published its Secure Messaging Scorecard which rates a number of apps and services according to the level of security they offer.

It's a fairly exhaustive list that includes numerous well-known names, as well as several more niche products. What is concerning, however, is that many of the most popular tools -- WhatsApp, Yahoo Messenger, Skype, SnapChat, and Facebook chat -- received very low ratings for failing to protect users and their communication data.

Continue reading

Samsung reveals Find My Mobile is safe, far too long after vulnerability goes public

relieved

Samsung's Find My Mobile device-tracking service was revealed last month to be vulnerable to a denial of service attack, which would allow hackers to lock and wipe enrolled handsets. The media quickly jumped on this, with some pundits suggesting that users should stop using Find My Mobile as soon as possible, due to the apparent risks involved.

Samsung today finally decided to chime in, telling its customers that they actually have nothing to worry about. The vulnerability in question, Samsung says, was fixed more than a week before it went public, resulting in no user data being compromised. Well, it sure took Samsung a long time to come forward with this information, seeing as news about it started to surface a week ago.

Continue reading

GCHQ's uncomfortable truth about the web: 'privacy has never been an absolute right'

GCHQ's uncomfortable truth about the web: 'privacy has never been an absolute right'

The head of GCHQ, the UK's equivalent of the NSA, says that the Edward Snowden leaks have helped terrorist organizations such as ISIS who have taken to the web to spread propaganda. Writing in the Financial Times, Robert Hannigan points out that ISIS is the first terrorist group whose members have grown up on the internet. He says that the group has made use of "messaging and social media services such as Twitter, Facebook and WhatsApp, and a language their peers understand" and that the security tools that have popped up post-Snowden makes the work of GCHQ in tracking communication much harder.

This might not come as a surprise, but something else that Hannigan says is likely to raise eyebrows. His assertion that "privacy has never been an absolute right" goes against the grain of what many web users believe, but he suggests that the challenges facing governments and intelligence agencies in fighting back against terrorists can "only be met with greater co-operation from technology companies".

Continue reading

Keep your keys in your pocket -- only you should be driving your data

keys

Generally speaking, an enterprise data security company and a National Security Agency leaker might make for strange bedfellows. Yet, some of the controversial Edward Snowden’s comments at the New Yorker Festival have us nodding our heads -- with reservations, of course.

In his video interview, Snowden warned about the vulnerability of some popular storage and collaboration tools, calling them "dangerous services" that are "hostile to privacy". Indeed, we too find it troubling that a vendor or government agency can access (and distribute) personal or corporate information, without the consent of the data owner.

Continue reading

Malware on the rise, with Trojans by far the biggest threat

Malware virus detected

Not worried about malware? Provided you take sensible precautions when on the web, and have decent anti-malware installed, your chances of getting infected are relatively low, but the threat still persists and isn’t to be underestimated.

According to PandaLabs, a total of 20 million new strains were created worldwide in the third quarter of 2014, which works out to 227,747 new samples being identified every day.

Continue reading

How health history is more valuable to hackers than your credit card information

medical records

A recent article stated that medical records could be sold for up to 20 times more than credit card information on the black market. There are various factors as to why consumers’ medical information has become so valuable. This article considers those factors as well as some precautions medical providers can take to better protect themselves against malicious threats.

The first thing that needs to be addressed is why hackers prefer to buy and sell medical records versus credit card information.

Continue reading

Revealed: the secret guide to encryption, hacking, and surveillance for governments

Revealed: the secret guide to encryption, hacking, and surveillance for governments

There is now great interest in the level of governmental interference that takes place into online activity. Edward Snowden told the world about what the NSA was up to and there are now numerous websites dealing with the revelation that he made. One such site is The Intercept, and it has just published the secret manuals that are supplied to governments who want to use a suite of specialist tools to monitor web users' activities.

Sub-titled "the hacking suite for governmental interception", RCS 9 (or Remote Control System) is a suite of tools from Hacking Team. The Italian security and surveillance company is responsible for providing hacking and monitoring guides and software to a list of countries including Colombia, Korea, Mexico, Nigeria, and Saudi Arabia. RCS itself is "a solution designed to evade encryption" -- the sort of encryption put in place by Google.

Continue reading

Facebook opens up to Tor users with new secure .onion address

Facebook opens up to Tor users with new secure .onion address

For those who are concerned about their privacy post-Snowden, there are various ways to boost online privacy such as using the anonymizing Tor browser. Browsing the internet anonymously is something that scares the authorities -- there were reports just a couple of months ago that Comcast was threatening to cut off customers who chose to use Tor -- but now Facebook has opened up to the idea.

The social network -- often criticized for its own privacy policies -- has lifted its bans on using Tor, and has created a secure URL (https://facebookcorewwwi.onion/). This can be used to visit Facebook using any Tor-enabled browser and adds a few extra layers of protection for those looking to stay secure. While the idea of anonymity on Facebook may seem oxymoronic, there is a degree of logic.

Continue reading

Next-gen firewalls need to evolve to avoid becoming irrelevant

quantum_particles_2_contentfullwidth

When Gartner coined the phrase "next generation firewall", in 2003, it captured a then-nascent approach to traffic classification and control. Combining traditional packet filtering with some application control and IPS layered on top, today's 'legacy' NGFWs do pretty much what they say on the tin.

However, while NGFWs continue to be a vital part of an organization’s protection, they were designed for a time before advanced targeted threats started attacking our enterprises -- threats which often go undetected until it's too late.

Continue reading

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.